Joomla! Joomla!

DiceLock product implements european patent EP1182777 and US patent US7508945, "Self-corrector randomisation-encryption and method".

patent-map European Patent Office (EPO): EP1182777
 
United States Patent Trademark Office (USPTO): US7508945

DiceLock patents covers the countries of France, Germany, Ireland, Spain, Switzerland, United Kingdom and United States and will stand until October 2.019

 

The broader definition of european patent EP1182777 and US patent US7508945 (which was conceived som time ago, 1.998) allows the use of a great number of block and stream ciphers and random number test that appeared after its conception.

Currently at DiceLock Security our focus is researching with current state of the art encryption algorithm as AES 128, AES 192, AES 256 as block ciphers base with CBC, CFB ans OFB operation modes and HC 128 and HC 256 as stream cipher algorithms.

greendiceDiceLock cipher generates randomized-encrypted text sequences, encrypted text sequence that has random number properties. Encrypted text sequences where there is no relationship or any pattern in the encrypted text sequences. The user (sender and receiver, and everybody) is able to check that it is at random with random number tests (as those implemented in DiceChecker product).

When DiceLock was conceived NIST FIPS-140 where used as random number tests. As it has been pointed, the broader definition of the idea allows us to use National Institute of Standards and Technology (NIST) new random number suite published in FIPS 800-22rev1a on April 2010.

"Self-corrector randomisation-encryption and method" granted on 08/21/2003 as european patent EP1182777 and on 03/24/2009 as US patent US7508945 will stand until October 2.019.

DiceLock consist of the following general concept:

  - 1st definition:  
  Data sequence self-corrector randomisation-encryption system (501) for generating an encrypted and random sequence from a plaintext sequence (X) by the use of a freely selectable encryption key (K) comprising:
first input means (511) for receiving said plaintext sequence (X),
second input means (512) for receiving said encryption key (K),
corrective randomising-encrypting means for correctively randomising-encrypting said plaintext sequence (X) with said encryption key (K) generating a candidate randomised-encrypted text sequence (AP), and for generating on the basis of a randomness verification result (T) a new candidate randomised-encrypted text sequence (AP),
randomness verifying means (603) for verifying randomness of said candidate randomised-encrypted text sequence (AP) based on a predetermined randomness test and supplying said randomness verification result (T) in order to generate said new candidate randomised-encrypted text sequence (AP), and supplying said candidate randomised-encrypted text sequence (AP) as randomised-encrypted text sequence (A) if said randomness test indicates that said candidate randomised-encrypted text sequence (AP) is random,
transmission means (513) for transmitting said randomised-encrypted text sequence (A), whereby said randomised-encrypted text sequence (A) corresponds to said plaintext sequence (X) received by said first input means (511),
whereby said randomized-encrypted text sequence (A) is encrypted, and
whereby the confusion and diffusion of values of said randomised-encrypted text sequence (A) is ensured.
 
     
  - 2nd definition:  
  Data sequence self-corrector randomisation-encryption method (501) for generating an encrypted and random sequence from a plaintext sequence (X) by the use of a freely selectable encryption key (K) comprising the steps of:
(a) correctively randomising-encrypting said plaintext sequence (X) with said encryption key (K) and generating candidate randomised-encrypted text sequence (AP),
(b) verifying randomness of said candidate randomised-encrypted text sequence (AP) based
on a predetermined randomness test and repeating said step (a) as many times as necessary until said candidate randomised-encrypted text sequence (AP) is at random, being supplied said candidate randomised-encrypted text sequence (AP) as randomised-encrypted text sequence (A) when said randomness test indicates that said candidate randomised-encrypted text sequence (AP) is random,
(c) transmitting said randomised-encrypted text sequence (A) via a transmission channel (513),
whereby said randomised-encrypted text sequence (A) corresponds to said plaintext sequence (X),
whereby said randomized-encrypted text sequence (A) is encrypted,
whereby the confusion and diffusion of values of said randomised-encrypted text sequence (A) is ensured.